Current P2P (overlay) networks have been designed with a focus on the construction of efficientmechanisms for the storage and retrieval of information among a community of participating nodes,with limited attention to the protection from malicious behaviors. The paper analyzes the attacks thatcan be realized on the choice of identifiers by the nodes and proposes adequate countermeasures. Thepaper uses as a reference the Kademlia protocol, but the results are immediately applicable to most DHTnetworks.

(2005). ID mapping attacks in P2P networks [book chapter - capitolo di libro]. Retrieved from http://hdl.handle.net/10446/20586

ID mapping attacks in P2P networks

PARABOSCHI, Stefano;
2005-01-01

Abstract

Current P2P (overlay) networks have been designed with a focus on the construction of efficientmechanisms for the storage and retrieval of information among a community of participating nodes,with limited attention to the protection from malicious behaviors. The paper analyzes the attacks thatcan be realized on the choice of identifiers by the nodes and proposes adequate countermeasures. Thepaper uses as a reference the Kademlia protocol, but the results are immediately applicable to most DHTnetworks.
book chapter - capitolo di libro
2005
Cerri, Davide; Ghioni, Alessandro; Paraboschi, Stefano; Tiraboschi, Simone
File allegato/i alla scheda:
Non ci sono file allegati a questa scheda.
Pubblicazioni consigliate

Aisberg ©2008 Servizi bibliotecari, Università degli studi di Bergamo | Terms of use/Condizioni di utilizzo

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10446/20586
Citazioni
  • Scopus 18
  • ???jsp.display-item.citation.isi??? 1
social impact